Sciweavers

3555 search results - page 643 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
SIGMOD
2009
ACM
202views Database» more  SIGMOD 2009»
16 years 1 months ago
A comparison of flexible schemas for software as a service
A multi-tenant database system for Software as a Service (SaaS) should offer schemas that are flexible in that they can be extended for different versions of the application and d...
Stefan Aulbach, Dean Jacobs, Alfons Kemper, Michae...
HT
2009
ACM
15 years 4 months ago
Four measures for the dynamics of coalitions in social networks
We introduce four measures for the change of coalitions in social networks. The first one measures the change of the agents in the network over time, The second one measures the ...
Guido Boella, Leendert van der Torre, Serena Villa...
TLDI
2010
ACM
247views Formal Methods» more  TLDI 2010»
15 years 10 months ago
F-ing modules
ML modules are a powerful language mechanism for decomposing programs into reusable components. Unfortunately, they also have a reputation for being “complex” and requiring fa...
Andreas Rossberg, Claudio V. Russo, Derek Dreyer
RTSS
2000
IEEE
15 years 5 months ago
A User-Customizable Energy-Adaptive Combined Static/Dynamic Scheduler for Mobile Applications
In portable applications, the energy consumed by OS and application tasks primarily comes from DC battery source, which is limited and imposes an upper bound to the amount of time...
Trolan C. L. Ma, Kang G. Shin
IBMRD
2011
112views more  IBMRD 2011»
14 years 8 months ago
Sensor Andrew: Large-scale campus-wide sensing and actuation
—We present Sensor Andrew, a multi-disciplinary campus-wide scalable sensor network that is designed to host a wide range of sensor, actuator and low-power applications. The goal...
Anthony Rowe, Mario Berges, Gaurav Bhatia, Ethan G...